Describes the security architecture of iOS and offers information on such topics as encryption, jailbreaks, code signing, sandboxing, iPhone fuzzing, and ROP payloads, along with ways to defend iOS devices.... sudden some malicious code (perhaps in the form of a web page, e-mail, or text message) takes advantage of a vulnerability ... This might mean exposing less code to the attacker (reducing the attack surface) or cleaning up and removing asanbsp;...
|Title||:||IOS Hacker's Handbook|
|Author||:||Charlie Miller, Dion Blazakis, Dino Dai Zovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philip Weinmann|
|Publisher||:||John Wiley & Sons - 2012-05-08|